Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.
BIOS Could Hide Rootkits
Attackers could use the PC's Advanced Configuration and Power Interface, a collection of power management controls, to code or deploy snippets of a rootkit into the BIOS flash memory, a researcher says.
January 27, 2006
1 Min Read
Attackers armed with rootkits may hide some of their malicious code inside the PC's BIOS flash memory, a researcher said at this week's Black Hat conference, a tactic that would make it tougher for defenses to detect the cloaking, and infecting the computer permanently, even if the operating system's reinstalled.
John Heasman, principal security consultant for U.K.-based Next-Generation Security Software (NGS), laid out the threat in a presentation Wednesday at the Black Hat conference in Washington, D.C.
Attackers could use the Advanced Configuration and Power Interface (ACPI), a collection of power management controls, and its programming language to code and/or deploy snippets of a rootkit into the BIOS flash memory. Hackers could even replace legitimate functions in the ACPI's language with their own, malicious, operations, said Heasman.
Among the dangers of such BIOS rootkits, he added, were that they were immune to reboots -- eliminating the current practice of hackers re-running the code each time the machine starts up, one way security software sniffs out malicious code -- weren't detectable on the drive (which current security software spends most of its time examining), and could survive disk reformatting and operating system reinstallation.
To defend systems against such strategies, Heasman said systems could be set to prevent BIOS memory reflashing (usually done by resetting a jumped on the motherboard) or shifting to computers with use signed BIOS, such as Phoenix Technologies' TrustedCore or Intel's SecureFlash.
You May Also Like
The ultimate survival guide to SOC 2 compliance
NIST Cybersecurity Framework 2.0: Changes, impacts, and opportunities for your InfoSec program
Edge Computing Bridges IT and OT People, Process, and Technology
2023 Cloud Security Report
Checklist: Top 6 Considerations to Optimize Your Digital Acceleration Security Spend